Network Location Privacy Protection Based on Game Theory

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Location Depersonalization for Location Privacy Protection in Location-Based Services

A spatial region with K different footprints indicates that it has been visited by K different people. An adversary may be able to identify all these users, but will not know who was there at what time. This observation gives us a new direction to investigate location depersonalization in location-based services (LBSs). We propose to leverage users’ historical location samples, each being a foo...

متن کامل

Location Privacy Protection Through Obfuscation-Based Techniques

The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications that manage physical positions of individuals to offer location-based services for business, social or informational purposes. As an effect of such innovative services, however, privacy concerns are increasing, calling ...

متن کامل

Improving Privacy Protection for Location Based Services

1 V. Kartheek Kumar Reddy, 2 Dr. A.P. Siva Kumar M.Tech,Ph.D 1 PG Scholar, Department of Computer Science & Engineering (Artificial Intelligence), JNTUA College of Engineering (Autonomous), Anantapuramu, AP, India 2 Assistant Professor, Department of Computer Science & Engineering, JNTUA College of Engineering (Autonomous), Anantapuramu, AP, India 1 [email protected] 2 SivaKumar.ap@g...

متن کامل

Ontology-Based Privacy Protection in Location Commerce

Location commerce extends e-commerce through the provision of location-related activities, but this gives rise to greater concerns about privacy invasion. To encourage the smooth growth of location commerce, it is suggested that control over the sharing of intimate information be given back to the consumer. This study proposes an ontology-based privacy protection (OPP) framework that allows con...

متن کامل

Wireless Location Privacy Protection

A fter more than two decades of hype, computing and communication technologies are finally converging. Java-enabled cell phones run a host of powerful applications including mobile Internet access, while many notebook computers offer high-speed wireless connectivity as a standard feature. The big decision when purchasing a PDA this holiday season is whether to get integrated cellular service or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: DEStech Transactions on Engineering and Technology Research

سال: 2018

ISSN: 2475-885X

DOI: 10.12783/dtetr/ecar2018/26352